architectures

Results 1 - 25 of 324Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: whether businesses are realising the benefits they anticipated from cloud migration how effective companies are at managing cloud investments the risks and consequences of getting locked into inefficient architectures.
Tags : 
    
KPMG
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions cant ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Published By: Equinix EMEA     Published Date: May 22, 2019
This playbook outlines how insurance companies can evolve their business architectures to meet user demand, reduce risk and comply with regulations. Insurers employees, partners and customers are increasingly interacting at the digital edge, where commerce, population centers and digital ecosystems intersect. A distributed interconnection platform at the digital edge allows insurance companies and ecosystem participants to accelerate their transformation and effectively compete with increasingly nimble challengers.
Tags : 
    
Equinix EMEA
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
A key benefit of an SD-WAN is that you need not replace any part of your existing network. SDWAN simplifies your overall network architecture and management, and can be phased in as a parallel, overlay network. Sites are migrated in phases based on their type, location or any other sequence of priority you may have. This paper covers the migration design thought process, routing considerations, and a step-by-step migration path to insert your traditional WAN sites into an SD-WAN architecture.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Datastax     Published Date: May 20, 2019
DataStax Enterprise and Apache Kafka are designed specifically to fit the needs of modern, next-generation businesses. With DataStax Enterprise (DSE) providing the blazing fast, highly-available hybrid cloud data layer and Apache Kafka detangling the web of complex architectures via its distributed streaming attributes, these two form a perfect match for event-driven enterprise architectures.
Tags : 
    
Datastax
Published By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read Secure Enterprise SD-WAN for Dummies and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read Secure Enterprise SD-WAN for Dummies and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read Secure Enterprise SD-WAN for Dummies and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: IBM APAC     Published Date: May 14, 2019
Digital transformation (DX) continues to headline business initiatives as companies look to remain competitive in the rapidly changing IT landscape. Organizations are increasingly investing in and implementing next-generation applications and architectures such as software-defined IT and hybrid IT to drive higher levels of efficiency and agility. These modern technologies and architectures, however, also require organizations to evolve their underlying infrastructure to support new capabilities and demands. Recent strength in the server market, which continues to operate in a marketwide refresh cycle, illustrates the growing demand for new infrastructure. 1Q18 marked the server market's fifth consecutive quarter of both shipment and revenue growth and represented a fourth consecutive quarter of year-on-year ASP growth, as customers continue to replace aging server infrastructure with more powerful and efficient systems that leverage the latest platform developments from processor supp
Tags : 
    
IBM APAC
Published By: Avi Networks     Published Date: May 10, 2019
Modern data centers run a combination of cloud-native applications and microservices architectures alongside traditional applications. Networking teams are under pressure to deliver services and resolve application issues quickly while lowering costs for application services. Your IT operations demand agile, cost-effective load balancing solutions.
Tags : 
    
Avi Networks
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When todays incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The outside-in digital transformation of the past decade is giving way to the inside-out potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
    
Group M_IBM Q2'19
Published By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create virtual workforces of robotic workers.
Tags : 
    
Blue Prism
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises seeking to become application-centric, with many modern data centers now running a combination of cloud-native applications based on microservices architectures alongside traditional applications. With application owners seeking publiccloud- like simplicity and flexibility in their own data centers, IT teams are under pressure to deliver services and resolve application issues quickly, while simultaneously reducing provisioning time for new applications and lowering costs for application services.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks
Published By: Red Hat     Published Date: Feb 25, 2019
How to strike the balance between your existing systems and emerging technologies. Many organizations are struggling with the pressure to adopt cloud-native architectures while maintaining existing conventional systems. A virtualized infrastructure can connect your new and old systems. This IDC paper helps you achieve the ideal balance by: Embracing the new without disrupting the current infrastructure. Preparing for next-generation computing requirements. Enabling agile application delivery to compete and win. Read the IDC whitepaper to learn more about balancing your investment in new and existing systems.
Tags : 
    
Red Hat
Published By: Apstra     Published Date: Feb 21, 2019
Modern data centers based on hyperscale, leaf-spine switching architectures are growing so large and complex they are outstripping the capacity of operators to engineer, configure and manage these networks using traditional tools and techniques. As a result, data center operators are looking for new ways to automate workflows, maximize uptime and increase operational agility while reducing operating costs
Tags : 
acg, data center efficiency
    
Apstra
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions cant ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
    
Citrix Systems
Published By: Jelecos     Published Date: Feb 11, 2019
The AWS Well-Architected framework has been developed to help cloud architects utilize best practices to build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for Jelecos and its customers to evaluate architectures and provides guidance to help implement designs that will scale with your application needs over time.
Tags : 
    
Jelecos
Published By: Lenovo - APAC     Published Date: Feb 11, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as they do not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.